First published: Mon Nov 02 2009(Updated: )
Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Server | =1.0.9 | |
VMware Server | =1.0.1_build_29996 | |
VMware Server | =1.0.1 | |
VMware ESX | =3.5 | |
VMware Server | =1.0.2 | |
VMware Server | =1.0.8 | |
VMware Server | =1.0.4 | |
VMware Server | =1.0.7 | |
VMware ESXi | =3.5 | |
VMware Server | =1.0.4_build_56528 | |
VMware Server | =1.0.3 | |
VMware Server | =1.0.6 | |
VMware Server | =1.0 | |
VMware Server | =1.0.5 | |
VMware ESX | =3.0.3 | |
VMware Server | =2.0.0 | |
VMware Server | =2.0.1 | |
Linux Linux | ||
All of | ||
Any of | ||
VMware Server | =2.0.0 | |
VMware Server | =2.0.1 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3733 is classified as a moderate severity vulnerability that allows remote attackers to read arbitrary files.
To fix CVE-2009-3733, upgrade VMware Server to versions 1.0.10 or 2.0.2 and VMware ESX or ESXi to their respective patched versions.
CVE-2009-3733 affects VMware Server versions prior to 1.0.10 and 2.0.2, and VMware ESXi and ESX versions 3.5 and 3.0.3.
The potential impact of CVE-2009-3733 includes unauthorized access to sensitive files and data exposure for affected systems.
While CVE-2009-3733 is an older vulnerability, systems running unsupported versions of VMware are still at risk if not properly updated.